Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe
Resource
win10v2004-20241007-en
General
-
Target
4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe
-
Size
537KB
-
MD5
9c011343afd1e58e4413df421d963d6c
-
SHA1
ff0136390774652e37b61df839bdf2e526f092d5
-
SHA256
4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4
-
SHA512
66be521fb704d4bdfda1c7cee281b8ae6575c6c215cf03f1c3c3d78fa6712bef5a5b7ad2e5ed7230662ff9bfb5204c2c07a0cb35cd98872e018d91d4ccc92e1f
-
SSDEEP
12288:pMr2y90Z9ntDG66u6Upqch2SebmqrUVNHmwQDrOUVyFWUM1Q7:HyQ9ntK66hUsA2nrQGwQDrOOUWUX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006099.exe healer behavioral1/memory/4020-15-0x0000000000920000-0x000000000092A000-memory.dmp healer -
Healer family
-
Processes:
jr006099.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr006099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr006099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr006099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr006099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr006099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr006099.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4268-22-0x00000000025B0000-0x00000000025F6000-memory.dmp family_redline behavioral1/memory/4268-24-0x0000000004E40000-0x0000000004E84000-memory.dmp family_redline behavioral1/memory/4268-38-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-40-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-88-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-86-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-84-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-80-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-78-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-77-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-74-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-72-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-70-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-68-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-66-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-64-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-62-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-58-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-56-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-54-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-52-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-50-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-48-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-46-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-44-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-42-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-36-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-34-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-32-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-30-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-82-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-60-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-28-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-26-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/4268-25-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziUr5811.exejr006099.exeku344843.exepid process 452 ziUr5811.exe 4020 jr006099.exe 4268 ku344843.exe -
Processes:
jr006099.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr006099.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exeziUr5811.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUr5811.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exeziUr5811.exeku344843.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUr5811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku344843.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr006099.exepid process 4020 jr006099.exe 4020 jr006099.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr006099.exeku344843.exedescription pid process Token: SeDebugPrivilege 4020 jr006099.exe Token: SeDebugPrivilege 4268 ku344843.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exeziUr5811.exedescription pid process target process PID 4272 wrote to memory of 452 4272 4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe ziUr5811.exe PID 4272 wrote to memory of 452 4272 4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe ziUr5811.exe PID 4272 wrote to memory of 452 4272 4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe ziUr5811.exe PID 452 wrote to memory of 4020 452 ziUr5811.exe jr006099.exe PID 452 wrote to memory of 4020 452 ziUr5811.exe jr006099.exe PID 452 wrote to memory of 4268 452 ziUr5811.exe ku344843.exe PID 452 wrote to memory of 4268 452 ziUr5811.exe ku344843.exe PID 452 wrote to memory of 4268 452 ziUr5811.exe ku344843.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe"C:\Users\Admin\AppData\Local\Temp\4b44acffefc53f9e1dc0a01a14eeddc43875b5a37a556f5f3996d424303fdea4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUr5811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUr5811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006099.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006099.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku344843.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku344843.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5b20f84b114e04919438ec37222c685c6
SHA113ad5efe90bba135ada99908b0e29a2ddab47cc2
SHA2563f0089562e003c64ef2882fc8674046f1c75e011ad7930665142b45d9b3f3568
SHA512de861bb222ee2bdf4c441e29817cc0f93308b12ad14bee9965990eb415a50bd78f1a11dd0f2bc56bef2916e74a8489e42c5e23e7cfdf4f2f55af87dbe0c0a2ab
-
Filesize
14KB
MD5bcd7bb9bf57bed7baec094dabe5d12d1
SHA1ba1fb124a01c7422ec20ddd45eeabc8ab79bada5
SHA2568c7572c092dab866ee10da558df7b45477a0e9569923e1ee8ce637ed74654837
SHA512b0851bd50307da7784ca1aad54117d4e29f461193c017bca31a5ad36abb7cc3708fe05fdc73adb1869f9438a98a870bf2bf55d86e8db5bcfe3cca05314c5e9dc
-
Filesize
352KB
MD57d5dc888fc0d1b36850c7a834c0f6002
SHA1575cfe84c204f9c5c3e1ba6c5cc599494836851b
SHA25608b9521f8a3efb5fb27d567a5c946d6c684d6c82c8b62d3d95a883e39ef51f01
SHA512a85d14f1503cdd35674141165a5f2039b37085dc75a64a6bec980c5504f6029622688cc6d0253af2978bb60ce7588cc8d69c8205d9bc136f0e99abce594dc964